Application Development

The application development community features top thought leadership focusing on optimal practices in software development, SDLC methodology, mobile app development and application development platforms and tools. Join top software engineers and coders as they cover emerging trends in everything from enterprise app development to developing for mobile platforms such as Android and iOS.

The days of relying on a single Content Delivery Network (CDN) are far behind us. With a wide range of CDN providers available, each with unique regional strengths and weaknesses, using more than one CDN is now virtually required of any business that cares about providing its users with an optimal experience. But with multiple CDNs comes unique traffic steering and management challenges. Learn what these are, and how best to solve them so you’re able to maximize the performance of your multi-CDN strategy.

Hear from one of our customer-facing Services experts to learn the ins and outs of the Veracode platform. See how Veracode can you started with assessing and managing security risk across your entire application portfolio. With a wide range of security testing and threat mitigation techniques, all hosted on a central, cloud-based platform – your security program will be up and running and ready to scale.

During this webinar, you will see a demo of the Veracode platform’s ability to scan all of the applications and components you build or buy, covering all major languages, frameworks, and application types. As a central repository for your applications and components, Veracode’s platform provides you with full visibility into your risk posture and integrates into each stage of your software development lifecycle, so you are building and delivering secure software.

Customers around the world are embracing the CloverETL platform to eliminate clumsy hand-coded scripts and legacy data management solutions. Learn how to leverage CloverETL to simplify and automate data integration within your enterprise.

In our 20 minute high-level overview, discover how to efficiently develop, orchestrate and automate data transformations, from file-to-database loads to automating complex data movement between databases, files and Web Service APIs. See real-life examples of how some of our customers deploy CloverETL for reporting, migration, warehousing and BI and how your organisation could too.

Finally, we end with a live Q&A session, offering advice on your challenges and how to deliver your use case using CloverETL.

The live session will close with a Q&A session, where we can walk through your specific concerns and use cases.

Augmented Reality and Virtual Reality hold the potential to affect nearly every facet of daily business. Those implications go beyond the disruptive nature of even the mobile phone.

Explore the business implications of AR & VR with John as he discusses trends through the lens Big Data, Analytics, and AI.

John, IBM’s Head of AR/VR Labs, will discuss real-world examples of compelling work in these categories, draw on the lessons learned, and expand on future trends that businesses should seriously consider when using AR or VR in their company.

In recent months, Artificial Intelligence has become the hottest topic in the IT industry. In this session, we’ll explain how Deep Learning — a subset of AI — differs from traditional Machine Learning, and how AWS customers use it to solve complex problems such as computer vision and natural language processing. Then, using Python code, we’ll show you how to start writing and training models using Apache MXNet, a popular library for Deep Learning which supports both CPUs and GPUs. Finally, we’ll demonstrate how you can achieve excellent results quickly by using state-of-the-art, pre-trained models.

In this presentation, we will discuss several applications of NLP such as information extraction, knowledge synthesis, and entity retrieval. We will discuss how these fundamental set of algorithms are applicable for a wide array of use-cases and industry verticals such as healthcare, business intelligence, life sciences, legal, e-commerce, sales, and marketing.

Additionally, case studies from these areas will be used to provide an intuitive explanation of complex NLP topics such as distributional semantics, computational linguistics, question-answering, conversational AI, and applications of deep learning to text data.

This is the age of data science. We have more data, computing power and software packages than ever before, and we’re driving real value with data science. But challenges remain: fragmented and dirty data, collaboration issues, and long project cycle times.

Keys to success: a ‘data-first’ approach, enabling collaboration, and a focus on prediction. Cloudera Data Science delivers the unified platform you need for rapid time to value with the most advanced machine learning techniques, including deep learning.

With the advent of the digital economy, there’s been a variety of agile concepts, technologies, and frameworks, like microservices, that have popped up and gained traction in the market. The Eclipse MicroProfile project is an open source community specification that optimizes Enterprise Java™ for a microservices architecture and delivers application portability across multiple MicroProfile runtimes.

In this webcast, you’ll get an introduction to the background, present, and future of the Eclipse MicroProfile project.

Transformational. Impactful. Defining. All of these words have been used to describe service virtualization – a technology so powerful that software engineering teams across the globe rely upon it to help protect their brand and their business.

At 10 years old, service virtualization is now an established technology that has proven its value by:

•Giving software engineering teams unrestricted access to incomplete or unavailable services to complete their tasks in the software lifecycle
•Reducing defect reproduction time
•Reducing the number of defects and increasing test coverage.

Join Theresa Lanowitz, founder of industry analyst firm voke and author of the leading research on service virtualization and its impact in the enterprise, and Nate Lee Director of Product Management for Service Virtualization at CA Technologies to learn about why service virtualization is an absolute must for any organization that wants to compete in the digital landscape and about what service virtualization can do for software engineering teams in the future.

Whether you've attended or missed AWS re:Invent 2017 in Vegas, join Stelligent's CTO Paul Duvall and Chief Architect Casey Lee for insights on what the new announcements will mean for the DevOps community. We will cover some essential best practices and resources for you as you head into the new year and you too can be continuously deploying!

About Stelligent
Stelligent is a technology services company that provides DevOps automation and Managed Services on Amazon Web Services. As an AWS Partner Network (APN) Premier Consulting Partner and AWS Managed Service Provider with deep expertise in Continuous Delivery solutions, our services guide and empower customers to achieve increased agility, confidence and cost savings from their applications on AWS.

DevSecOps experts from Visa and CYBRIC discuss cyber threat survival. With rapid innovation and continuous delivery via DevOps, organizations are exposed to a constant threat and to catalyze it, threats are evolving rapidly. Equifax was recently the target of perhaps the most critical data breach ever. Hackers exploited a vulnerability in an open-source software package that allowed them to exfiltrate sensitive information on half of the US population.

How can we protect ourselves against such breaches?

Organizations need to seamlessly embed continuous security within existing ecosystems, to enforce continuous security and orchestration within the production environment. In this webinar, Swapnil Deshmukh, a Sr. Director of Emerging Technologies Security at Visa discusses the cultural changes needed for an enterprise to imbibe and deliver continuous security, including:

• Coverage: Ensure proper metrics, analytics and reporting are in place to measure the effectiveness of existing security tools and processes; have an up-to-date inventory and complete coverage of all code published in production at any given point.
• Continuous Monitoring: Broadly applied, continuous monitoring can provide network traffic visibility. This, coupled with behavioral analysis and anomaly detection, builds necessary trustworthiness into the information systems supporting the organization’s key control missions.
• Feedback Loop: A constant feedback loop from security technology stacks is critical for overall maturity of the security operation center.

Guest Presenter:
Swapnil Deshmukh is a Sr. Director of Emerging Technologies Security at Visa. His team is responsible for attesting security for emerging technologies. He’s coauthored the Hacking Exposed series, is a member of OWASP and has helped Fortune 500 companies build secure operations centers.

Organizations in most any industry are feeling increasing pressure to move fast. But at what cost? Some have learned the hard way that skipping crucial processes, like testing, damages performance and impacts customer sentiments on your brand. In this case, the fast time to market becomes meaningless.

Smart businesses are adapting to a shift left strategy. These teams are learning how to incorporate testing early and often in the release cycle, supporting business requirements to move fast while ensuring high-performing products and quality. But getting there isn’t easy. In this webinar, we’ll cover:

•Testing tools: tool choice is important. Not all tools have been designed to support this new paradigm.
•Integrations: to be effective, testing tools must integrate easily with the tools and processes modern teams use, including CI/CD and APM products. Further, these tools must be very easy to use, specifically for developers.
•Organizational models: shifting left requires changes to traditional organizations and culture. We’ll share insight into the successful models we’ve seen.

Natural language processing is a key component in many data science systems that must understand or reason about text. Common use cases include question answering, paraphrasing or summarization, sentiment analysis, natural language BI, language modeling, and disambiguation. Building such systems usually requires combining three types of software libraries: NLP annotation frameworks, machine learning frameworks, and deep learning frameworks.

The library implements core NLP algorithms including lemmatization, part of speech tagging, dependency parsing, named entity recognition, spell checking and sentiment detection. The talk will demonstrate using these algorithms to build commonly used pipelines, using PySpark on notebooks that will be made publicly available after the talk.

David Talby has over a decade of experience building real-world machine learning, data mining, and NLP systems. He’s a member of the core team that built and open sourced the Spark NLP library.

Join us to learn about SAP Business One, and how its features complement Square for Retail.

Moty Moshin and Idit Saguey, Business One Solution Experts at SAP, will provide an overview of SAP Business One and describe how its powerful back office features complement the elegant front office features of Square for Retail.

Part three of the Domain-Driven Design Webinar Series examines the internal software architecture of applications. This part of Domain-Driven Design is often misunderstood or poorly implemented by teams working with frameworks such as OR-Mapping tools.

You will learn how to use building blocks such as Entities, Value Objects and Aggregates for modeling the core domain of your application—the heart of your software’s business logic. In addition, we will look at the differences between JPA and DDD Entities and Value Objects—and rest assured there are some substantial differences.

Finally, this webinar will cover patterns such as Factories, Repositories and Application Services and show you how to put everything in context with a rough architecture structure.

Crowd Machine is a distributed computational network powering next generation blockchain and decentralized apps. It leverages the principles of strong federations in a trust-less environment to deliver interoperable blockchain apps on a network of peers. The network includes an embedded code-less app development capability that allows anyone to create decentralized apps at unprecedented speeds. During this webinar, we will be demonstrating the technology and providing an overview of the decentralized architecture.

You can't predict when, but we can show you how the next attack might happen.

We will discuss the security trends of 2017 that predict the most likely threats of 2018. We will cover the expanding list of attack targets and identify the necessary tools to protect against the newest attack vectors.

Whether you are using Office 365 or G Suite, Slack or Salesforce, Box or Amazon S3, you need to protect your data from malware, data leakage or malicious users.

All of these cloud applications can be used to infiltrate your business. All of these cloud applications are potential targets of an attack.

While no one can predict tomorrow's attack, we can analyze the trends and build a multi-layer, defense-in-depth solution that can respond to the changing threat landscape.

Join us on Thursday, December 7th at 10:00AM PT as DevSecOps expert and writer, Gregory S. Bledsoe (@geek_king on Twitter), provides insight into balancing quickness with security into the DevOps environment. In addition, Dr Ravi Rajamiyer, VP Engineering at Cavirin, will demonstrate the steps required to securing the container (Docker/Kubernetes) lifecycle.

Competition is fierce and today’s businesses cannot afford to slow down their development processes to wait for security to catch up. Development lag time could mean the difference between success and failure, so DevOps and SecOps must find ways to unite. Securing the application lifecycle from the beginning has become key to making DevSecOps real.

What you will learn:

>> The why, the what, and the how of DevSecOps
>> Repackaging security and looking at change as an opportunity
>> How to refine a standard DevOps workflow to address security requirements
>> Automating security through the container lifecycle

Access to and within DevOps environments have proliferated over the past few years, with both users and scripts (with embedded credentials). This privileged identity sprawl poses significant risks that need to be addressed.Join CA Technologies and (ISC)2 on December 7, 2017 at 1:00PM Eastern. In this session, we'll look at the technology and approach that CA takes to secure such environments.

Providing a great digital experience is critical for your brand, but the complexity of monitoring modern apps presents a challenge. When you combine a mix of mobile and Web applications, containers and microservices in distributed environments, identifying when and why your customers are having a poor app experience is often difficult.

Join us for this webinar where Bryan Whitmarsh, Director, Product Management at CA Technologies will demonstrate how you can achieve a 5-star app experience for your customers. See how CA App Experience Analytics leverages a powerful, open source analytics platform to provide user experience insights and deep visibility into performance across apps and channels.

If your organization says it too large or has too many legacy systems to take on an agile transformation, this webinar may change your mind. We’ll dig into how the Mainframe Business at CA Technologies, the founding product of our 40 year old company, embraced the Scaled Agile Framework (SAFe®) to help improve product quality, drive innovation, and create a culture of empowered teams.

Join Dean Leffingwell, Founder of Scaled Agile, Inc and creator of SAFe®, and Ashok Reddy, General Manager of the Mainframe Business Unit at CA Technologies, to discuss how traditional, mission critical systems, with little room for risk, can push the boundaries of scaling agile and be the leaders for transformation across an organization.

Since aligning 74 teams to the Scaled Agile Framework over the past eight quarters, the Mainframe Business Unit has:
•Shipped 56 new product releases with zero defects
•Reduced the defect backlog by 45%
•Reduced the support backlog by 44%
•Deployed 3 new, organically-driven products

Public clouds provided by services like AWS and Azure continue to surge in popularity with organizations small and large. However, the security of these services and how the responsibility for it is shared can be murky. Organizations want to assure that the public cloud is being used properly by everyone in the enterprise and to run mission-critical applications while meeting compliance and security controls. Join Gigamon and (ISC)2 on Thursday, December 14, 2017 at 1:00PM Eastern for a roundtable discussion on public clouds and the shared responsibility model and how that can help to secure and protect your organization.

Implementing a more strategic approach to testing can have a huge impact on product quality, but measuring exactly how your QA strategy has made a difference can be challenging. The long-term success of any QA strategy depends on measuring change and communicating that change to the team at large, so it’s important to measure the right metrics.

In this webinar, discover...
1. Five essential metrics that QA teams should track
2. How to avoid common pitfalls when it comes to measuring the success of a QA strategy
3. Techniques to level-up product quality by taking a data-driven approach to software testing

Deliver Production-like Environments Early in the Dev/Test Lifecycle
As a growing number of financial enterprises look into adopting Cloud and DevOps, environment complexity is often cited as one of the top barriers for such initiatives. Focusing on a Shift Left philosophy to deliver production-like environment access early on in the dev/test lifecycle can tremendously increase quality, cut down the cost to fix issues and, more importantly, increase innovation speed. This webinar will cover an example of using cloud sandboxes for allowing access to authentic replicas of production environments, allowing financial firms to focus on release software faster without sacrificing security and compliance.

Join us for a new webinar in our series focused on helping companies prepare for the upcoming global government regulations, like European General Data Protection Regulation (GDPR). Data sovereignty, especially for cloud-first companies, is becoming an important part of any security strategy as these data breach regulations go into effect next year. Being able to demonstrate best efforts to protect the privacy of an individual’s data will be a requirement and non-compliance will have hefty monetary ramifications.

This webinar will walk attendees through what Gemalto has already done and is doing to prepare for data privacy regulations from product management to sales operations and more. Our Director of Global Data Privacy, Jean-Pierre Mistral, will share how and what we have done, takeaways and timelines and Alex Hanway, Product Marketing, will cover the different technologies companies can use to mitigate the risk of non-compliance and what this means for business operations globally.

Join us to hear more about:
•What is GDPR?
•Case Study: A look at how Gemalto has prepared for GDPR
•The implications for local businesses and technologies that can help mitigate risk around complying with data privacy regulations

Award-winning JustPark is the UK’s leading parking app, with more than 1.5 million users and over £1m in transactions each month. In 2015, its first crowd funding effort broke records, reaching £3.5m. Its second round – which is still in progress - raised £1m in just three hours.

With investment in the second round currently sitting at just over £2m, we talk to one of the app’s senior developers about how JustPark will develop for scale, and its plans for taking on the £50bn UK parking industry.

Questions include:

• With the incredible growth and projections of JustPark, how are you going about scaling the app for the rapidly growing user base?

• What coding environment do you use at JustPark? Have you used any specific tools that streamlined your processes?

• Is there a uniform coding style at JustPark or does each developer have his or her own standard and style?

• What type of development style does JustPark subscribe to as a whole? What have you found the benefits of this to be?

• How did you integrate your payment systems? Do you have any learnings to share with our community who may be embarking on this for the first time?

• Does JustPark encourage you to create tools and systems on the side that help the team?

This talk will explore the evolution of multimode fiber from inception to current time against the historical transceiver roadmap. We will explore various transceiver form-factors with respect to capability, technology risk, density and cost vs. fiber types that have been deployed (and those yet to be widely deployed). Both transceivers and supported fibers will also be discussed with respect to the evolution of standards that support them.
Attendees will earn 1 BICSI CEC.

Organizations continue to rapidly move their workloads to the cloud as they benefit from the flexibility and agility this can provide. However, many security processes become increasingly difficult to manage in a Shared Responsibility model. Top among these is vulnerability management which is the key to visibility into virtual and multi-cloud networks. Join Skybox and (ISC)2 on December 19, 2017 at 1:00PM Eastern for our final ThinkTank of the year where we will discuss how to better prioritize and manage vulnerabilities and the best way to provide visibility (and thus, context) into the physical, virtual and multi-cloud environments all organizations find themselves dealing with now.

Ensure that all your applications are accurately assessed with policy-based scanning.
Join this 20 minute webinar to see how Veracode can help you protect your organization against data breaches and meeting regulations and policies addressing cybersecurity and information security controls in a timely manner.
See how the Veracode Platform provides built-in, automated compliance workflows to reduce communication overhead and provide a secure audit trail of your compliance processes, including notifications about policy changes. Veracode’s unified platform can also help you address OWASP security issues by integrating security seamlessly into software development and eliminating vulnerabilities at the most efficient and effective points in the development/deployment chain.

Recent public breaches highlight the importance of a security strategy that extends beyond the network perimeter. As organizations adopt containers, an automated approach to security, testing, and application development is needed to increase productivity and reduce risk.

In this webcast, you'll learn how Red Hat OpenShift Container Platform can be used to:
- Integrate security monitoring software into CI/CD pipelines for containerized applications.
- Know what's in your containers and where they come from, which is vital to secure and quickly remediate workloads.
- Enhance open source library security, in true DevSecOps fashion, and establish a security-first mindset for application development.

There are many considerations when it comes to choosing your fiber termination method – from the number of connections and the application being supported, to performance and overall required time to go live. While pre-terminated fiber solutions offer significant benefits in terms of factor-terminated performance and ease of deployment, they do require proper planning and predetermining of lengths, as well as longer lead times. Choosing a field termination method like fusion splicing or mechanical splice connectors comes with its own set of additional considerations, including cost, required skill set and labor efficiency. This webinar will examine the various types of fiber termination methods available today, providing pros and cons of each method and basic considerations to help you choose the fiber termination that’s right for your specific fiber deployment, including key questions to ask and termination time comparisons and analysis.

"What is cloud-native development?” And, “How do I transition from a traditional application development approach?” These two questions are often top of mind for developers and IT strategists tasked with aligning existing IT applications and investments more closely with current digital business needs.

In this webcast get answers to these questions and learn about considerations for choosing a cloud-native platform, how to plan for a successful transition, and Red Hat’s approach to cloud-native services.

Join us to learn about the Enterpryze Omnichannel Suite, a Mobile and Cloud simplified ERP that integrates SAP Business One and Square for Retail.

Morgan Browne, CEO of Enterpryze, will provide an overview and demo of the Enterpryze Omnichannel Suite. This cloud-based ERP suite provides users with the back office power of SAP Business One fully integrated with the omnichannel elegance of Square for Retail. It can be licensed for $75/month/user and takes only minutes to get started.

Kubernetes automates deployment, operations, and scaling of applications, but Kubernetes should extend beyond system management and help developers, too. Kubernetes should make it easy to write the distributed applications and services that run in cloud and datacenter environments. .

During this webcast, you will learn:
-How to make application deployment and operations at scale simple and reliable
-How to make it easy to create “cloud-native” applications in the first place
-Idiomatic, efficient, clean, and extensible design and concurrency patterns leveraging Containers, Docker and Red Hat OpenShift.

Securing the enterprise Jenkins credential store is paramount given the fact that it is a potential attack vector. Join us to explore CoreOS' new Vault Open Cloud Service (OCS) and learn how it can be used to secure Jenkins running on CoreOS Tectonic.